240 likes | 658 Views
E-rule : Cyber crimes. Tutorial. cyber news. “ It is a growing threat to the national economy ”. Incidence of cyber crime in the country jumped 88 per cent last year with 15,218 cases compared with 8,090 in 2010.
E N D
E-rule : Cyber crimes Tutorial
cyber news “It is a growing threat to the national economy” Incidence of cyber crime in the country jumped 88 per cent last year with 15,218 cases compared with8,090 in 2010. CyberSecurityMalaysia's chief executive officer Lt Col (R) HusinJazri, in disclosing this, said the majority of cases reported last year involved online fraud, intrusion and harassment. New Straits Times (1 March 2012)
MEET THE ATTACKERS Hacker Cyber Extortionist Corporate Spies Cyber Bully Cyber Terrorism
1. hacking & cracking • Breaking into computer system to gain an unauthorized access. • Defeating the security capabilities of computer system to obtain an illegal access to the information stored
1. hacking & cracking • To acquire financial information of a bank and change the bank accounts. • To steal data on business or consumer. • To distribute viruses.
1. hacking & cracking • Someone who accesses a computer or network illegally. • Both have advanced computer and network skills. Hacker Cracker
1. hacking & cracking • Has the same intent as crackers and hackers . • BUT does not have technical skills and knowledge. • Use prewritten hacking and cracking program to break into computers. Script Kiddies
2. Cyber bullying • Occurs when a person is bullied, harassed, humiliated, threatened, embarrassed, or targeted in some way by another person. • It is done through the use of the internet, cell phones and other forms of digital technology
2. Cyber bullying • “Borrowing” someone’s screen name and pretending to be them • Nasty instant messaging session. • A website set up to mock others. • A threatening e-mail.
2. Cyber bullying • Normally committed by one child or teenager towards another child or teenager. • Sometimes, adults are involved too. • This is done because of motivated by anger, revenge or frustration. Some just do it for entertainment. Cyber Bully
3. Cyber Terrorism • Is the convergence of terrorism and cyberspace • An unlawful attacks and threats of attack against computers, networks, and the information • It is done because of political or social objectives
3. Cyber Terrorism • Uses Internet or network for political reasons • Target : nation’s air traffic control or telecommunication infrastructure • Require a team of highly skilled individuals, millions of dollars and several years of planning Cyber Terrorist
4. Cyber Espionage • The act or practice of obtaining secrets • It is done without the permission of the holder of the information • They seek personal, sensitive, proprietary information
4. Cyber Espionage • Have excellent computer and networking skills • Hired to break into computer to steal data and information or to identify security risk on organization • Immoral company hired them to gain competitive advantage Corporate Spies
5. Cyber Extortion • It is a crime involving an attack or threat of attack against an enterprise • It is done coupled with a demand for money to avert or stop the attack
5. Cyber Extortion • Uses e-mail for extortion • Send threatening e-mail message indicating they will expose confidential information, exploit security flaw or launch attack to the company’s network – if they are not paid a sum of MONEY Cyber Extortionist